At a Glance
- Tasks: Join our team to conduct penetration testing and enhance security for LME systems.
- Company: Be part of the London Metal Exchange, a leader in the financial sector.
- Benefits: Enjoy a competitive salary, health benefits, and opportunities for professional growth.
- Why this job: Kickstart your career in cybersecurity and make a real impact on security measures.
- Qualifications: Ideal for recent grads or those with entry-level certifications in IT or security.
- Other info: Dynamic work environment with a focus on continuous learning and collaboration.
The predicted salary is between 28800 - 43200 £ per year.
This role is an entry-level position within the Information Security team at the London Metal Exchange (LME). This role will be a junior member of the penetration testing team to conduct penetration testing of LME systems and applications. Penetration testing will include scoping, performing assessments, identifying vulnerabilities, documenting technical exploitation steps, and providing recommendations and remediations.
The successful candidate will work closely with IT Engineering, Security Operations, and Infrastructure teams to ensure that security controls are effectively implemented and maintained across LME's platforms.
Key Responsibilities- Participate in offensive assessments (red team, penetration testing, breach and attack simulation, bug bounty) and defensive security operations (threat hunting, incident handling, investigation and forensics, detection engineering) for LME systems and infrastructure.
- Support security incidents and act as stretch capacity for incident response and threat handling; participate with on-call duties and after-hours support of incident management for incident escalations.
- Participate in Red/Blue Team testing, identify gaps/weaknesses in monitoring capabilities and recommend/implement changes.
- Review intelligence feeds and generate advisories as needed. Stay up-to-date with current and emerging trends that represent a threat to LME.
- Support threat hunting based on the defined threat model and specific attack scenarios. Perform analysis of existing data to discover patterns, and build use cases to detect malicious activity.
- Optimise detection and response rules; support the testing and recertify SIEM rules against threat models and detection frameworks.
- Assist in the deployment and maintenance of security tools and platforms (e.g., E-Mail Security, DLP, SIEM, Endpoint Protection).
- Develop and support the automation of security tools, configuration, and updates using scripting (e.g., Python, PowerShell, Bash, NPM).
- Contribute to Infrastructure as Code (IaC) efforts using Terraform or Ansible.
- Help monitor and maintain secure configurations across Windows, Linux, and Kubernetes environments.
- Provide support for incident response and troubleshooting related to security tooling and access controls.
- Provide support for Red/Blue team testing and penetration testing.
- Help maintain documentation, standards, and procedures related to security engineering and platform protection.
- Participate in on-call and weekend support rotations as needed.
- Desirable: A University degree or equivalent qualifications in a STEM subject such as Computer Science, or Engineering and/or Information Systems.
- Desirable: Entry-level certifications such as CompTIA Security+, Microsoft SC-900, or AWS Cloud Practitioner.
- Activity on TryHackMe, HackTheBox, and OSCP-related / Red Team training (or some equivalent the named platforms).
- Demonstrable activity on Github showing code, tools development, and/or contributing to projects and repos in the offensive security space.
- Up to 2 years of experience in IT, security engineering, or DevOps (internships or academic projects included).
- Basic understanding of:
- Ethical Hacking & Penetration Testing
- Networking and security protocols (TCP/IP, HTTPS, DNS, Firewalls, Proxy)
- Operating systems (Windows, Linux/Unix, Kubernetes)
- Scripting or programming (Python, Bash, PowerShell)
- CI/CD tools and cloud platforms (e.g., Ansible Tower, Bitbucket, Hashicorp Vault, Pipelines, AWS, Azure)
- Working knowledge of SDLC
- Security Tooling (e.g., EDR, SIEM, Antivirus)
- Curiosity about emerging threats and technologies
- Ability to assess and prioritize tasks/risks
- Attention to detail
- Enthusiastic about security engineering and automation.
- Strong analytical and problem solving skills.
- Effective communicator with good documentation habits.
- Team‐oriented, proactive, and adaptable in a fast‐paced environment.
- Willingness to learn and grow within a critical infrastructure environment.
- Commitment to continuous learning.
The LME is committed to creating a diverse environment and is proud to be an equal‐opportunity employer. In recruiting for our teams, we welcome the unique contributions that you can bring in terms of education, ethnicity, race, sex, gender identity, expression and reassignment, nation of origin, age, languages spoken, colour, religion, disability, sexual orientation and beliefs. In doing so, we want every LME employee to feel our commitment to showing respect for all and encouraging open collaboration and communication.
Cyber Threat Specialist (Penetration Tester) in London employer: Hong Kong Exchanges and Clearing
Contact Detail:
Hong Kong Exchanges and Clearing Recruiting Team
StudySmarter Expert Advice 🤫
We think this is how you could land Cyber Threat Specialist (Penetration Tester) in London
✨Tip Number 1
Network like a pro! Get out there and connect with folks in the cybersecurity field. Attend meetups, webinars, or even local events. You never know who might have a lead on that perfect Cyber Threat Specialist role!
✨Tip Number 2
Show off your skills! Create a portfolio showcasing your penetration testing projects, whether they're from internships or personal projects. Having something tangible to share can really set you apart when chatting with potential employers.
✨Tip Number 3
Practice makes perfect! Use platforms like TryHackMe or HackTheBox to sharpen your skills. The more you practice, the more confident you'll feel during interviews, and we all know confidence is key!
✨Tip Number 4
Apply through our website! We love seeing candidates who are genuinely interested in joining our team. Tailor your application to highlight your passion for cybersecurity and how you can contribute to our mission at LME.
We think you need these skills to ace Cyber Threat Specialist (Penetration Tester) in London
Some tips for your application 🫡
Tailor Your CV: Make sure your CV is tailored to the Cyber Threat Specialist role. Highlight any relevant experience, skills, and projects that align with penetration testing and security assessments. We want to see how you fit into our team!
Craft a Compelling Cover Letter: Your cover letter is your chance to shine! Use it to explain why you're passionate about cybersecurity and how your background makes you a great fit for the role. Don’t forget to mention any hands-on experience with tools or platforms like TryHackMe or HackTheBox.
Show Off Your Projects: If you've got any GitHub projects or contributions in the offensive security space, make sure to include them! We love seeing practical examples of your skills and creativity. It gives us a glimpse into your problem-solving abilities.
Apply Through Our Website: We encourage you to apply through our website for the best chance of getting noticed. It’s super easy, and you’ll be able to keep track of your application status. Plus, we love seeing candidates who take the initiative!
How to prepare for a job interview at Hong Kong Exchanges and Clearing
✨Know Your Basics
Make sure you brush up on your understanding of ethical hacking and penetration testing. Familiarise yourself with networking protocols like TCP/IP and HTTPS, as well as operating systems such as Windows and Linux. This foundational knowledge will help you answer technical questions confidently.
✨Show Off Your Projects
If you've been active on platforms like TryHackMe or HackTheBox, be ready to discuss your experiences. Bring examples of your work from GitHub that showcase your coding skills or any tools you've developed. This not only demonstrates your practical skills but also your passion for the field.
✨Prepare for Scenario Questions
Expect scenario-based questions where you might need to identify vulnerabilities or suggest remediation steps. Practise articulating your thought process clearly, as interviewers will be looking for your analytical skills and problem-solving approach.
✨Be Curious and Engaged
Show your enthusiasm for security engineering and automation by discussing recent trends or emerging threats in the industry. Ask insightful questions about the company's security practices and how they handle incident response. This will demonstrate your commitment to continuous learning and growth.